Results 41 to 50 of about 2,490,029 (269)
Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis
The side-channel community recently investigated a new approach, based on deep learning, to significantly improve profiled attacks against embedded systems.
Gabriel Zaid +4 more
openalex +3 more sources
Designed Azolopyridinium Salts Block Protective Antigen Pores In Vitro and Protect Cells from Anthrax Toxin [PDF]
Background:Several intracellular acting bacterial protein toxins of the AB-type, which are known to enter cells by endocytosis, are shown to produce channels.
A Kronhardt +76 more
core +2 more sources
SCAUL: Power Side-Channel Analysis With Unsupervised Learning [PDF]
Existing power analysis techniques rely on strong adversary models with prior knowledge of the leakage or training data. We introduce side-channel analysis with unsupervised learning (SCAUL) that can recover the secret key without requiring prior ...
Keyvan Ramezanpour +2 more
semanticscholar +1 more source
Side-channel analysis of SEcube™ platform
Cryptography provides techniques to cypher and de-cypher sensitive information through a token called key in order to store and transmit it across insecure networks. The goal of cryptography is to protect information from potential attackers and to enable access to authorized users only.
Bollo, Matteo +3 more
openaire +2 more sources
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis
Power-based Side-Channel Analysis (SCA) began with visual-based examinations and has progressed to utilize data-driven statistical analysis. Two distinct classifications of these methods have emerged over the years; those focused on leakage exploitation ...
Clay Carper +4 more
doaj +1 more source
Investment cost channel and monetary transmission [PDF]
Copyright @ 2011 Central Bank Review. This article is available open access through the publisher’s website at the link below.We show that a standard DSGE model with investment cost channels has important model stability and policy implications.
Basso, HS, Coto-Martinez, J
core +2 more sources
Embedded Systems and their Vulnerabilities to Hardware Attacks [PDF]
The article describes the types of hardware attacks targeting embedded systems,countermeasures, and methods of modelling security threats. In currently used electronic devices, thesoftware usually ensures very high level of security.
Konrad Szczepankiewicz, Marian Wnuk
doaj +1 more source
Forensic Insights From Smartphones Through Electromagnetic Side-Channel Analysis
The increasing use of smartphones has increased their presence in legal and corporate investigations. Unlike desktop and laptop computers, forensic analysis of smartphones is a challenging task due to their limited interfaces to retrieve information of ...
Asanka P. Sayakkara, Nhien-An Le-Khac
doaj +1 more source
An electrostatic mechanism for Ca(2+)-mediated regulation of gap junction channels. [PDF]
Gap junction channels mediate intercellular signalling that is crucial in tissue development, homeostasis and pathologic states such as cardiac arrhythmias, cancer and trauma.
Abagyan, Ruben +9 more
core +3 more sources
The adoption of deep neural networks for profiled side-channel attacks provides powerful options for leakage detection and key retrieval of secure products.
Guilherme Perin +2 more
semanticscholar +1 more source

